Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2023, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
POORD20231109001.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
POORD20231109001.exe
Resource
win10v2004-20231020-en
General
-
Target
POORD20231109001.exe
-
Size
809KB
-
MD5
5c4180b748b40a11611cbac14d4827d6
-
SHA1
fd005cac55e3b1fe44e2b88fcf124a0b1dfb0286
-
SHA256
d059a3bb4ddac726db29101656b244b8bf425a3e1c638bbe51e8765c7d66c86b
-
SHA512
e588733cea468c6c501757ce517ce3d5893da77591708a612c4a2bdc8fa257d60cb6f06d08dceecec8bc0b8b534bbb4ba6cd10fa4c762e3c5adff6f85852edf3
-
SSDEEP
12288:28orMbmZeadAZYMTT1M3kTOSvQKGd5ypP7r9r/+pppppppppppppppppppppppp1:BeMbmZea2ZYK1ASvf1q
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bezzleauto.com - Port:
587 - Username:
[email protected] - Password:
Tommyduru8118 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation POORD20231109001.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2276 set thread context of 2112 2276 POORD20231109001.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2280 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 464 powershell.exe 1260 powershell.exe 2112 POORD20231109001.exe 2112 POORD20231109001.exe 464 powershell.exe 1260 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 464 powershell.exe Token: SeDebugPrivilege 1260 powershell.exe Token: SeDebugPrivilege 2112 POORD20231109001.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1260 2276 POORD20231109001.exe 95 PID 2276 wrote to memory of 1260 2276 POORD20231109001.exe 95 PID 2276 wrote to memory of 1260 2276 POORD20231109001.exe 95 PID 2276 wrote to memory of 464 2276 POORD20231109001.exe 97 PID 2276 wrote to memory of 464 2276 POORD20231109001.exe 97 PID 2276 wrote to memory of 464 2276 POORD20231109001.exe 97 PID 2276 wrote to memory of 2280 2276 POORD20231109001.exe 99 PID 2276 wrote to memory of 2280 2276 POORD20231109001.exe 99 PID 2276 wrote to memory of 2280 2276 POORD20231109001.exe 99 PID 2276 wrote to memory of 2112 2276 POORD20231109001.exe 101 PID 2276 wrote to memory of 2112 2276 POORD20231109001.exe 101 PID 2276 wrote to memory of 2112 2276 POORD20231109001.exe 101 PID 2276 wrote to memory of 2112 2276 POORD20231109001.exe 101 PID 2276 wrote to memory of 2112 2276 POORD20231109001.exe 101 PID 2276 wrote to memory of 2112 2276 POORD20231109001.exe 101 PID 2276 wrote to memory of 2112 2276 POORD20231109001.exe 101 PID 2276 wrote to memory of 2112 2276 POORD20231109001.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\POORD20231109001.exe"C:\Users\Admin\AppData\Local\Temp\POORD20231109001.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\POORD20231109001.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\HrAADtCmIIam.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:464
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HrAADtCmIIam" /XML "C:\Users\Admin\AppData\Local\Temp\tmp72BA.tmp"2⤵
- Creates scheduled task(s)
PID:2280
-
-
C:\Users\Admin\AppData\Local\Temp\POORD20231109001.exe"C:\Users\Admin\AppData\Local\Temp\POORD20231109001.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD5d7ab3b22dbd60742eed1a38b4ddc00fc
SHA147d978a71262074155fb82a40273afcbd4654479
SHA2560691743d51dd31c288ae9657df7afb018af7b0cbccac95d613d75093c5319baa
SHA512453abaa71934595fc1785428795a9247b8a55bd0b83a68887beada2fe833c74653d3b127d1ffddaed95ae02f8d22efb47b317ba4708ae8ff919d71dcb16ce8db
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD55ea68fd3892d1272638026199d4b4d70
SHA16404886081ad0c7ca61752cc4d72fa17c828a23e
SHA2563968599413dc1c9ad10880e707e269c06804683898a68ec756721bd9e14447d6
SHA512ecf9617e238c6eaaf8fc8ec1022417581f1f776bc6bcba5fbae5a1aaf64046e2eeeb93f324fa8a086cf4a87d880b8a1803f7543e5ca277f312b98d9599e6b68e